Winner of the coveted iF award for its superior design, DOOR FOT is a versatile device designed for reliability, modularity and performance. COSEC DOOR FOT, a well-engineered door controller, can be used for applications like time-attendance and cafeteria management. It records exact time of a user using fingerprint, RF card or PIN as credential in less than one second. Features of DOOR FOT: 128*64 Dot Matrix display with touch sense keypad Identification in less than one second 5,00,000 e...
Matrix, a manufacturer and provider of telecom and security solutions, is conducting Matrix Insight 2019 Jeddah and Riyadh on 18th and 22nd April respectively from 09:00 AM to 12:30 PM. Matrix welcomes everyone in the telecom and security industry from new prospects, strategic partners to existing customers and suppliers. At the event, Matrix will highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of small and medium organisations are migr...
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a r...
IDIS will celebrate five years at ISC West International Security Exhibition in Las Vegas, April 10-12th, with a comprehensive showcase of the South Korean manufacturer’s IDIS Total Surveillance Solution in booth #18059. Highlights of the company’s fifth anniversary with ISC West include areas of special emphasis on cybersecurity, deep learning analytics and facial recognition, and solutions for the retail and banking sectors; and a review of IDIS’s latest technology releases....
The MFC-2160 fingerprint sensor is based on capacitive-touch technology with a hardened surface and enhanced ESD strength. The built-in analog and digital circuits could minimise the number of external components and provide easy-to-use standard SPI interface to microprocessors. MFC-2160 capacitive fingerprint sensor The operation of the MFC-2160 capacitive fingerprint sensor is as following: a fingerprint image captured by the pixel array, delivering fingerprint ridge or valley signals to A/D...
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced they are emphasising tailgating mitigation through integrated technologies in booth #8037 at the ISC West exhibition in Las Vegas, NV from April 10-12. ISC West is the largest security trade show in the United States, bringing together 30,000 security professionals for its 3-day event. Boon Edam is also the official turnstile sponsor of the show. Tailgating mitigation through integrated solution...
Princeton Identity Inc., the identity management company, announced the launch of its new IOM Access600e iris and face biometric capture device, a premium level unit designed for high volume enrolment and fast, convenient identification in high security, high throughput applications. The Access600e replaces the company’s Access500e model, offering superior performance, significantly lower pricing, and a sleek, updated form factor that allows it to fit easily on tight table counters. The unit can comfortably process subjects with a wide range of heights, requiring them to simply glance at the device screen for a collection. Both face and iris can be processed in under 2 seconds. The 600e model features a fully contained lighting source, ensuring consistently high-quality capture of face and iris. Integration with passport scanners The Access600e integrates with passport scanners, fingerprint capture, badge readers and other sensorsThe Access600e integrates with passport scanners, fingerprint capture, badge readers and other sensors. This makes for a complete solution and streamlined enrolment that’s ideal for use at immigration checkpoints, secure military bases, and secure facilities with a large number of employees or contractors. Its ability to support large populations with high accuracy and throughput also makes it well-suited for arenas, cruise ships, theme parks and other commercial venues. The unit operates seamlessly with Princeton Identity’s Identity Management Platform and the IOM Access Control Product Suite, allowing for direct system enrolment. A web service interface enables integration into third party platforms with complex applications. Optional tri-modal enrolment is possible through integration with an external fingerprint capture device. Multi-modal biometric identity solutions The Access600e eliminates the traditional tug-of-war between convenience and security"Bob McKee, Princeton Identity’s VP, Sales and Marketing, says, “Princeton Identity’s multi-modal biometric identity solutions are the gold standard in accuracy while providing subjects with a fast and seamless experience.” Molly Levy, Product Manager says, “The Access600e completely eliminates the traditional tug-of-war between convenience and security, even in the most demanding, high-volume environments. Plus, with the Acces600e, we’ve been able to lower the price for such premium performance.” The IOM Access600e will be introduced at ISC West in Las Vegas, April 10-12.
Matrix COSEC ARGO is a performance, design and engineering wonder that brings a modern design to the access control and time-attendance applications. The device is equipped with an enhanced 3.5” IPS LCD touchscreen for optimising users’ visual experience. The door controller is designed to meet the aesthetics, technology and harsh environment application requirements of the large & multi-location enterprises, SME & SMB organisations. Matrix COSEC ARGO door controller: Enhanced 3.5’’ IPS Touchscreen LCD with Gorilla Glass 2x times Faster and Accurate User Verification Fingerprint – Optical & Multispectral, RF Card and PIN Bluetooth, Wi-Fi, PoE, Ethernet & GSM/VoLTE (Through Dongle) 50,000 Users and 500,000 Events Innovative Design - Wall and Flush Mount IP65, IK08, CE, BIS, FCC, RoHS Compliant
Fingerprint Cards' (Fingerprints) technology has been selected by Gemalto to bring additional performance to its next generation of dual interface payment cards. Gemalto, the world provider of digital security, will offer biometric EMV payment cards to its bank customers, using Fingerprints' T-Shape sensor and licensing the recently-launched Biometric Software Platform for payments. The initial order confirms the commitment of both companies to accelerate the deployment of biometric payment cards. Faster and seamless authentication With Fingerprints, we are bringing stronger, faster and more seamless authentication to payment cards""We evaluated a number of biometric systems for cards and Fingerprints came out with the most performing and promising solution," comments Sylvie Gibert, SVP Payment Card Business Line at Gemalto. "The new software working in harmony with their power-efficient T-Shape sensor, gives us maximised performance which, combined with the optimised and secure design of our biometric card, provides a market leading solution for our customers. With Fingerprints, we are bringing stronger, faster and more seamless authentication to payment cards." Fingerprints' T-Shape module is optimised for integration into smartcards using established manufacturing processes. The module's ultra-low power consumption means that cards do not need a battery, and its superior biometric performance ensures both security and convenience for cardholders. To ensure privacy, storage of biometric templates and image matching is conducted securely on the card, ensuring data never leaves consumers' control. Strong authentication to contactless payments We are looking forward to seeing the first biometric cards in consumers' hands, adding strong authentication to contactless payments""This is a turning point for biometric payment cards," says Thomas Rex, SVP Business Line Smartcards at Fingerprints. "Working with Gemalto, the leader in EMV Payment cards & digital security, is a gratifying collaboration and the recognition that our technology can meet their strong requirements in terms of performance. We are looking forward to seeing the first biometric cards in consumers' hands, adding much-needed strong authentication to contactless payments without impacting the user experience." This initial order comprises a few hundred thousand sensors to be delivered during 2019 and 2020 and is not, in itself, financially significant in relation to Fingerprints' total revenues. However, this is the first volume order in the biometric smartcard industry, which strengthens Fingerprints' view that the global market for biometric payment cards is about to materialise.
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced security and privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID solutions. GenKey’s ID platform has helped many governments and organisations to improve inclusivity, reduce fraud and improve time and cost efficiencies. IrisID, the world’s most deployed iris recognition platform, provides advanced security and privacy, which further enhances GenKey’s ID platform. “GenKey’s ID platform is being used to identify and verify millions of people in several countries worldwide,” said Arnd Langguth, chief operating officer, GenKey. “We are experts in fingerprint biometrics, but our ID platform has been designed for multi-modality. Our customers expect proven, secure, high performance, that is why we choose IrisID. IrisID’s IrisAccelerator will plug-in seamlessly into our ID platform.” Iris ID biometrics authentication systems The integration into Genkey’s ID platform now offers full deduplication on both modalities" The Iris ID technology provides a fast, accurate and non-contact method of capturing citizens’ biometrics, identifying people and detecting duplicates. Iris ID authentication systems are used worldwide for access control, time and attendance checks, national ID programs, border crossings, voter registration, and many other applications. The company’s solutions are currently being used by public and private organisations across Africa and on five other continents. Mohammed Murad, vice president of global sales and business development, Iris ID said the company’s technology is a natural fit with GenKey. Integration with GenKey biometrics ID platform “Our cameras are unaffected by dirt, grease, gloves, facial hair and other factors that can limit the quality of registration and identity verification of other biometric systems.” he said. “In addition to its speed and accuracy, our software has been proven to be highly effective for deduplication – the elimination of multiple registrations by the same person. The integration into Genkey’s ID platform now offers full deduplication on both modalities.” GenKey’s ID platform is designed for capturing biographic and biometric data of individuals in small to large-scale registrations and ensuring that each subject stored is unique. Besides its standard registration, verification and reporting modules, the software has customised modules for biometric voter verification, election management and biometric member verification for healthcare, and other use cases.
Global biometrics company, Fingerprint Cards AB (Fingerprints) has announced its Biometric Software Platform for payments, named FPC-BEP, targeting payment cards, wearables and USB dongles. The platform has been tailored to optimise the performance of its small and power-efficient biometric sensors for payments, which include the FPC1300-series and T-Shape module. Fingerprints can now offer card and device makers a complete hardware and software solution to secure biometric authentication and maximise the user experience. Biometric Software Platform for Payments As part of the Biometric Software Platform, Fingerprints has developed a new in-house algorithm, adapting its proven mobile algorithm, which verifies billions of 'touches' per day, to the specific needs of payment cards and payment devices. Extensive internal tests using a 1300-series sensor show impressive biometric performance and best-in-class robustness with <2% FRR* @ 1/20,000 FAR**, and the fastest matching time available on the market. "Biometric performance can only be optimised when you consider the whole package; hardware and software working in harmony," comments Pontus Jägemalm, Chief Technology Officer at Fingerprints. "Our technology is used billions of times every day, and now we have poured our long and unrivaled experience from the mobile world into this software platform to maximise the performance in low-power and low-computing-power payment environments."
Neurotechnology, global provider of deep learning-based solutions, robotics and high-precision biometric identification technologies, has reported the latest FVC-onGoing test results for their Palm Print recognition algorithm. Palm Print, part of Neurotechnology’s MegaMatcher SDK, was ranked as the most accurate for both full and partial palm prints, as the fastest partial palm print matcher and the fastest full-print matcher out of the five most accurate matchers. Neurotechnology’s algorithm also has the smallest template size overall, both in full palm print and partial (lower) palm print datasets. Fingerprint recognition technologies Our expertise in fingerprint recognition technologies carries over to palm print matching" "Our expertise in fingerprint recognition technologies carries over to palm print matching,” said Dr. Justas Kranauskas, head of the biometric research department for Neurotechnology. “Though the palm print is a larger, more detailed recognition task, our experience in this field allows us to bring the most accurate, highest efficiency application available to the palm print recognition market." Because of its complexity, palm print template matching requires much more computational time than single or multiple fingerprint matching. Focusing on speed, as well as accuracy, Neurotechnology has developed a palm print matching algorithm that is the fastest partial (lower) palm print matcher and fastest full palm print matcher out of the top five most accurate full palm print matchers in FVC-onGoing. It is suitable for both 1-to-1 (verification) and 1-to-many (identification) applications. Neurotechnology’s Palm Print recognition algorithm Neurotechnology’s palm print matching engine is included in MegaMatcher Standard and Extended SDKs. MegaMatcher SDKs, and the entire Neurotechnology biometric product line, can be purchased from Neurotechnology and through distributors worldwide. A free 30-day trial is available and, as with all Neurotechnology products, the latest version is a free upgrade for existing customers.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed. The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based video systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. the economics of the cloud make implementation of analytics much more affordable Augmented identity: biometrics in security Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial intelligence applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades. Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live video streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customisable turnstile solutions Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colourful appearance led booth visitors to ask about customisation. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.” Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.
Exhibitors at this year’s IFSEC are thinking outside the box in terms of how they communicate their value proposition and how they interface with customers. In the process, some are rethinking how big trade shows like IFSEC fit with their goals. Panasonic's approach to the 'race to the bottom' Thomas Lausten, MOBOTIX new CEO How Gallagher benefits from IFSEC without exhibiting Panasonic Systems Communications Europe Panasonic Systems Communications Europe is one of several companies emphasising solutions at IFSEC rather than products. In Panasonic's case, the approach helps to explain why the company doesn't have a traditional trade show stand. Instead, Panasonic opted to sponsor sessions in the security management education theatre on the show floor, and to host potential customers in a (quieter, cooler) meeting room upstairs. "We are inviting some of our key integrators for general business meetings in a relaxed environment, and offering two lunch-and-learn events about cybersecurity," says John Boyle, Panasonic's Country Manager for the UK and Ireland. There was standing-room only at the cybersecurity events, he adds. TBS specialises in 3D touchless biometrics and offers a full portfolio of fingerprint biometric technologies Compelling value proposition Trade shows seem historically to be about "here's our new box," Boyle observes. "We would rather talk to customers and channel partners about what issues they face, whether it's counting people or detecting scenes." Panasonic is creating solutions that combine their own technologies with third party partners filling in any gaps. "We are creating value propositions that we can take to integrators. They need a new story to tell their customers, not just a new box. Let's look at Panasonic's technology and how that adds value. If we have a compelling value proposition, we are giving our integrators an opportunity to get more business." Boyle acknowledges that the Panasonic approach is a way to bypass the price-focused "race to the bottom" that is lowering camera prices. "Pricing comes later if the value of a solution has already been established," he notes. Touchless Biometric Systems Philippe Niederhauser, Head of Sales and Marketing for Touchless Biometric Systems (TBS), Switzerland, is amazed at how many people come to IFSEC seemingly to browse around with little focus on what they need. "There are people who don't really know what they are looking for," he comments. "If I go to a trade show, I know exactly what I want." Niederhauser also sees some of his fellow exhibitors missing the boat in terms of marketing, tending to emphasise products rather than solutions. "Some people just put products out there, and they look similar; it is hard to differentiate," he says. "This is where you need to show a difference in products, and communicate the value proposition." TBS specialises in 3D touchless biometrics, and offers a full portfolio of fingerprint biometric technologies, also including 2D optical, 2D capacitative, and 2D multispectral systems. MOBOTIX keeps focus on technology A challenge in Thomas Lausten's new position is to communicate the advantages of MOBOTIX more effectively to the market Trends at this year's show are a big emphasis on cybersecurity, more integrated systems and applications that extend beyond the traditional definition of security, says Thomas Lausten, who just joined MOBOTIX as the new CEO. Cybersecurity is a strong suit of MOBOTIX, given the German video company's unique platform, an approach Lausten describes as "a computer with a lens." He says a challenge in his new position is to communicate the advantages of MOBOTIX more effectively to the market and to achieve the company's unrealised potential. "I don't see Mobotix as a traditional camera manufacturer," he says. "There is a fundamental difference between launching a camera and having a core philosophy as a company. I have been tasked with [managing] a company with a potential to be re-defined. Our mission is to develop a more open source company, although still an end-to-end solution, and a company that looks at the industry in a different way." He says the industry can expect new camera and software releases as MOBOTIX keeps its focus on technology. Quality communication through smaller events Gallagher, a New Zealand-based access control and perimeter security manufacturer, is an example of a company that seeks to benefit from IFSEC without exhibiting at the show. Steve Bell, Gallagher's Chief Technology Officer, travelled thousands of miles to the show for the networking opportunities, and Gallagher hosted a channel partner event in the evening, leveraging the fact that others have travelled to the show. "Trade shows are expensive outlays," says Bell. "For our strategy, we like more focused events, getting smaller groups together. Sometimes the big trade shows aren't focused enough. The people we might want to communicate with only have a short time, and it's a noisy environment. We don't have the quality communication we'd like to have. Smaller events provide more quality time." With manufacturers looking for new ways to engage with customers and build their businesses, the role of trade shows like IFSEC will, of necessity, continue to evolve.
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large, well-known companies and the government. “When big disasters happen, people begin rethinking what they need to protect against,” says Dick Fordham, Director of Marketing and Strategy, Recovery Point. “We try to imagine the worst that can happen, and put in place adequate measures to provide the security in those areas.” Recovery Point is a national provider of integrated business continuity and disaster recovery systems. The company stores copies of its customers’ critical enterprise data on its servers in multiple locations. Recovery Point enables customers to bring their systems and networks back up and let employees continue working despite any damage from the disaster. “We’re not a big company – about 150 employees – but we can service the biggest clients because we provide a high degree of personalised service,” says Fordham. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape Client data storage and backup Recovery Point’s flagship facility is located on a 17-acre private campus in Germantown, Maryland; about 30 miles northwest of Washington, D.C. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape in high-end, secure vaults. There are also two 100-seat work areas where displaced workers from customer companies can continue to perform their duties – one in Gaithersburg and another one in Kenosha, Wisconsin. Recovery Point is also a tenant in a data centre in Mt. Prospect, Illinois, providing an additional, redundant location to store data in case of a disaster. Recovery Point offers cloud backup strategies to handle data from major computer systems used by large companies; whether it’s mainframe computers, AIX operating systems or iSeries. In addition to providing recovery services in case of a disaster, the company works with companies daily to test and maintain their systems and to provide proof-of-concept demonstrations. Concentric circles of security Security is a large part of the services Recovery Point provides. The company leverages the most secure approaches and technologies to ensure that customers’ data is protected, including the familiar “concentric circles of security” approach familiar to most security practitioners. At the centre of the circle is the data of customer companies, what Fordham calls ‘the crown jewels.’ Recovery Point uses a combination of cyber, network and physical security to protect a customer’s data assets. “If their data is gone or corrupted, their business is gone or corrupted,” says Fordham. Location of the data centre(s) is the first stage of protecting the backup data. Recovery Point is located outside urban areas, away from likely terrorist threats, in an area that is not prone to hurricane or tornado activity. The ‘geographically stable’ area is above the 100-year floodplain. At the perimeter, there is no signage identifying the company or its mission. An anti-ram barrier topped with a 10-foot personnel security fence encircles the campus. At the gate, visitors must be validated remotely or by authorised badge and security code. Inside the perimeter, there are hydraulic anti-vehicle barriers that can resist a 30-tonne truck going 50 miles per hour. Bollards at four-foot intervals keep vehicles away from the building. Visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass Inside, visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass. Badges allow access only to the specific areas a visitor needs, whether it is the location where their data is stored, temporary work areas, meeting rooms or overnight sleeping quarters. Two-factor authentication includes iris-scan, fingerprint and voice recognition biometrics. Data security process Independent certification, including auditing of processes and physical boundaries around the data, meets standards such as the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorisation Management Program (FedRAMP). The network and power must also be stable and Recovery Point has Uptime Institute Tier 3 certification, which includes redundant, switchable systems. There is an A side and B side to each system; if one side is ‘down’ for maintenance or a malfunction, the other side is fully functional to ensure uninterrupted service. “Customers have already had one disaster,” says Fordham. “We make it as painless as possible for them not to worry about their data, to make them feel secure. In a disaster there are other things to worry about, such as their home and families. We want security you can see and security you can feel.”
Iris ID, a global provider of iris recognition technology, has partnered with Africa’s leading manufacturing conglomerate, Dangote Group, to provide a time and attendance solution for more than 30,000 employees working at Dangote Cement manufacturing plants in five countries. The Dangote Group is a Nigerian multinational industrial conglomerate, founded by Aliko Dangote. It is the largest conglomerate in West Africa and one of the largest on the African continent. The group employs about 35,000 people, generating revenue in excess of US$4.1 billion in 2017. Contactless facial recognition system Prasanna Burri, group chief Information officer, Dangote, Group, said the company wanted a biometric solution that provided greater accuracy than a facial recognition system previously used at the company’s cement manufacturing plants in Nigeria, Ethiopia, Senegal, Sierra Leone and Congo. The new system also had to be contactless to reduce the chances of spreading colds, flu and other diseases. The Iris ID readers provide us with a secure time and attendance solution" “Iris-based technology is not only contactless and more accurate but also faster than our previous system,” he said. “The Iris ID readers provide us with a secure time and attendance solution, deployed in Dangote Group’s public cloud that integrates seamlessly with the enterprise resource planning system at our Nigerian headquarters.” Early success Burri said the system’s early success has Dangote considering expanding it to more of its African operations. Mohammed Murad, vice president global sales and business development, Iris ID, said the iris-based solution was ideal for use in the Dangote cement manufacturing operations. “Our contactless readers work well in a dusty environment and are unaffected by employees wearing safety glasses and other protective gear,” he said. “Dangote is the largest indigenous industrial conglomerate in sub-Saharan Africa, helping to drive the continent’s growth. We’re happy to play a part.” Time and attendance system Initial installation of the time and attendance system was completed by Maxut Consulting Ltd. Of Lagos, Nigeria. Iris ID technology is used in several African nations providing identity authentication for national ID, voter registration and other public and private programs.
Princeton Identity Inc., a provider of secure biometric security systems, has announced the deployment of its Biometric Conex, designed to assist customers with quick and accurate personnel authentication for campuses and facilities. The Conex is a 20-foot long standard shipping container outfitted with on-the-move facial, iris and fingerprint biometric capture technology, which can be operational in less than 24 hours. Biometric Conex Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition this week in Washington, DC The first two containers will be shipped in October to government facilities. Princeton Identity is showcasing the Biometric Conex at the 2018 AUSA Annual Meeting & Exposition in Washington, DC. The Conex’s combination of patented authentication technology and portable configuration give organisations the flexibility to deploy these high throughput, accurate authentication units anytime, anywhere. Biometric high-throughput system The multi-modal, biometric high-throughput system offers more secure rapid personnel authentication and the following features: Face, dual iris, and 8 fingerprint rapid enrollment of personnel and on-the move multi-modal personnel identification Throughputs of over 15 people per minute Self-contained or networked configurations Allow list and watch list capable Can support large personnel database configurations Climate controlled, air conditioned and weatherproof Can be powered by a generator and comes with UPS backup Facility entry control The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process Current facility entry control procedures generally rely on credentials or limited biometric information to allow entry. In many cases, these procedures can cause excessive queuing, require extensive manpower, and are limited in their identification accuracy. The Biometric Conex eliminates these issues and provides a more accurate, seamless entry process. It contains a rapid enrollment station to simultaneously register subjects’ biometric signatures – fingerprints, face and irises – which takes less than a minute to process. The fusing of these three separate biometric modalities ensures the highest level of identification accuracy and eliminates potential spoofing attacks. When subjects enter the Conex, they walk through at a normal pace without stopping or touching any sensors, gain clearance, and are granted access to the facility. Contactless iris authentication “The government engaged with Princeton Identity to provide these units because we are the only identification firm with patented walkthrough, contactless iris authentication capabilities to support large groups of people,” said Mark Clifton, CEO of Princeton Identity. “Our software and physical hardware provide versatile identity authentication solutions designed to verify and manage individuals’ identities for a wide range of physical security and access applications, and we are already exploring other commercial uses for the Biometric Conex.”
National Security, a global safety and security products manufacturing company, has delivered some advanced security solutions equipped with the latest technology. The company has been known to meet every business challenge that enterprises face with its solutions. Their global reach and unparalleled range of products and services assisted customers in ensuring safety, security and business with the right solutions. Security access challenge Since this manufacturer of safety and security products was spread across India, it required a reliable time-attendance and access control system. However, the major issue lay with the implementation of such a system across different locations in India. Another issue that the company needed to deal with was to assign different attendance policies and shifts to its employees. The manufacturer also required a centralised management for their time-attendance and access control system. Solution Connected all locations with their central location for time-attendance Integration with HRMS software Centralised monitoring and control of all devices Auto Data Push to a central server Configured flexible attendance policies Products COSEC DOOR FOP: Fingerprint based Door Controller with Touch-Sense Keypad COSEC CPM MIFARE SMART: Card Personality Module for Mifare Smart Card COSEC PANEL LITE: Site Controller for Controlling Multiple Door Controllers COSEC ENROLL FINGER: Enrolment Station for Enrolling Finger COSEC CENTRA LE: Application Software for 1000 Users, Expandable up to One Million Users COSEC LE TAM: Time-Attendance Module for COSEC CENTRA LE COSEC LE ACM: Access Control Module for COSEC CENTRA LE COSEC USER1000: User License for 1000 Users Results Enhanced time-attendance solution with flexibility Fast fingerprint recognition Reduced costs and time savings on maintenance Excellent after-sales support Centralised monitoring Direct salary generation using HRMS integration
Varsity Management is an innovative education system focused on learning and leadership. Varsity offers well-designed courses plans that are in sync with the state and national board curricula. Based on the re-engineered learning patterns, these plans help teachers provide multisensory learning and develop social and thinking skills in students. Varsity Management is empowering 3,85,000+ students annually with its presence across 465+ schools, PAN India. Recording accurate attendance data The main requirement of the organisation was to bring its time-attendance under the same network umbrella. Varsity Management Pvt Ltd wanted to manage time-attendance of more than 15,000 employees at 100+ locations across India. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records of the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of staff members. They required a biometric hardware solution that could precisely capture employees’ attendance. Moreover, they needed instant SMS notifications for certain events like missing in/out punch, attendance summary, etc. Matrix meticulously studied the needs of Varsity Management along with its regional partner Vigilant Technologies Time-attendance management solution Matrix meticulously studied the needs of the institute along with its regional partner Vigilant Technologies. Having discussed in depth with Varsity’s team, Matrix offered its comprehensive Time-Attendance solution for managing and tracking staff movement from a single place. Matrix has installed 130 COSEC DOOR FOT V3 biometric time-attendance terminals at 100 locations across India. HR/Admin could easily track attendance of all employees and generate different types of reports for timely salary payment. Now users are updated instantly on different events like missing in/out punch, attendance summary, etc. when it occurs. Benefits of biometric time-attendance terminal Centralised Monitoring and Control Efficient Time-Attendance Management Quick and Easy Salary Calculations Improved Productivity Customised Reports
The potential for catastrophic injury in the petrochemical industry makes safety training and credentialing of employees imperative. Coordinating this process for a variety of industries, including many in the petrochemical fields of southern Alabama, is Training Solutions for Construction and Industry (TSCI). The mission of TSCI is to promote and facilitate workforce development ‘by providing industry-recognised training with portable credentials to create a diverse, trained and sustainable workforce’. TSCI provides computer-based and instructor-led training developed by the Association of Reciprocal Safety Councils (ARSC) and based on requirements from the Occupational Safety and Health Act (OSHA) and the U.S. Department of Homeland Security. Within one day, a person can gain all of his or her required training for a year, and it will be accredited. ID cards with encoded results Workers who successfully complete a TSCI safety orientation receive a tamper-proof ID card, encoded with the results of his or her training. “ID cards give students a record of their training and eventual access to a plant,” said Jack Fecas, Operations Manager, TSCI. The card is valid for one year. If other safety or specialised training is completed during that year, the card is encoded with the additional credentials. All member plants of TSCI and ARSC member organisations recognise and accept the ID card. Workers look to TSCI for training in such areas as fire safety, process safety management, confined space entry, respiratory protection, hazardous energy, basic first aid and CPR, scissor lift, scaffolding, excavation and trenching, elevated work surfaces, electrical safety and disaster site safety. The Office of Homeland Security also can set criteria for credentialing, such as asking for drug screen results. Site-specific and fire safety training TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill In addition to its basic orientation training programs, TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill. “Some companies using dangerous materials have wind socks to indicate which direction the wind is blowing, telling employees which exit route is safe for use at that time,” said Fecas. “This kind of training needs to be site-specific.” Other site-specific training might include basic alarm system safety, teaching employees what to do when they hear a constant alarm versus what they might do if they hear several short bursts of an alarm. About 1,500 workers take the basic orientation program from TSCI every year, and the numbers are growing. With only one printer, clearly more capacity was needed. Fargo’s DTC550 printer/encoder Fecas knew that his organisation needed more capacity in order to handle the increasing volume, so he began looking for an additional printer – one that was fast, yet reliable. He needed barcode code technology and a printer that could encode new data as workers took additional classes. TSCI found all of the requirements it was seeking in Fargo’s DTC550 Direct-to-Card printer/encoder from ID Wholesaler. Not surprisingly, the security offered by the DTC550 was a primary selling point for Fecas. In addition to being recommended by other ARSC Safety Councils, it just made good business sense. TSCI chose a standard holographic overlaminate available with the DTC550, which improves the card’s durability and reduces the risk of counterfeiting. More than 80 percent of training occurs at the TSCI offices, according to Fecas, but it also can take place at a plant site. With the new DTC550 able to handle the increasing demand at TSCI, the old printer will be used for remote training, thus increasing TSCI’s ability to meet the needs of its customers. Workspace security The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers" “The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers,” Fecas added. “They still have information to learn at the plant, but they are ready to go to work.” “We have had ID cards since we began in 1995,” he said, “but with the early cards, there was much more hand-work. Our operator had to add a photo by hand and then wait for the laminating machine to heat up before the card could be laminated. The evolution has been very interesting. In addition, we have been very pleased with the service provided by the Fargo printer and by ID Wholesaler. I can pick up the phone or send an e-mail, and a representative is available for assistance.” Most secure system “We recommended the DTC550 printer because it is very reliable and has more than one holographic laminate choice,” said Jeff Gunhus, ID Wholesaler Sales Team Leader. “TSCI originally bought just the printer and had to wait until its next budget cycle to purchase the lamination unit. They liked the fact that the Fargo printer had an upgrade path. It is important to listen to our clients’ wants, needs and concerns,” Gunhus added. “Then we simply do our best to help them out.” “If a company is going to do business nowadays, it needs to be secure,” adds Fecas. “Our business relies on plants and regulatory agencies trusting what we do. We need to be on the cutting edge when it comes to information technology. The best system is the most secure system. We made a decision to go with what has been tried and true and working in industry now.”
JK Tyre & Industries Ltd. have its biggest manufacturing setup in Mysore. The premise consists of a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for the company. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tiresome process. JK Tyres was looking for a vendor who could offer them a complete solution related to Time-Attendance and Visitor Management. Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees Matrix Time-Attendance solution Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees. Numerous shifts were created to manage Time-Attendance of over 500+ workers. Moreover, we provided Employee Self Service, which helped the employees view day-to-day attendance, apply for leave/tour, etc. JK Tyres further required a record of visitors so we delivered Visitor Management software, which helped them create a visitor pass, fetch visitor records and generate reports of the same. 40% Increase in Productivity of Employees and Workers Results Reduction in Cumbersome HR tasks Automatic Maintenance of Visitor Records on Day-to-Day basis 40% Increase in Productivity of Employees and Workers The Products COSEC VEGA FAX - Fingerprint and Card based Door Controller with Touchscreen, IP65, Wi-Fi and 3G/4G Connectivity Option COSEC PATH RDFM - Fingerprint and Card based Exit Reader with IP65 COSEC CENTRA ME - Application Server Platform with 500 Users and Expandable up to 1,000 Users for Basic Access Control and Raw Event Data COSEC ME TAM - Time-Attendance Software Module for COSEC CENTRA ME Users COSEC ME ESS - Employee Self Service Software Module for COSEC CENTRA ME Users COSEC ME VMM - Visitor Management Software Module for COSEC CENTRA ME Users
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?